CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA CySA+ CS0-003 All Acronyms Flashcards

FrontBack
OSSTMMOpen Source Security Testing Methodology Manual
ZAPZed Attack Proxy
DKIMDomain Keys Identified Mail
KPIKey Performance Indicator
SAMLSecurity Assertion Markup Language
WAFWeb Application Firewall
XSSCross-site Scripting
MOUMemorandum of Understanding
SPFSender Policy Framework
VPNVirtual Private Network
APTAdvanced Persistent Threat
JSONJavaScript Object Notation
BIABusiness Impact Analysis
ACLAccess Control List
APIApplication Programming Interface
DDoSDistributed Denial of Service
DNSDomain Name Service
GPOGroup Policy Objects
SLOService-level Objective
DRDisaster Recovery
FIMFile Integrity Monitoring
MACMedia Access Control
SASESecure Access Secure Edge
GDBGNU Debugger
SSOSingle Sign-on
CDNContent Delivery Network
CHDCardholder Data
ICSIndustrial Control Systems
SaaSSoftware as a Service
LOILetter of Intent
LDAPSLightweight Directory Access Protocol
OSOperating System
XDRExtended Detection Response
XXEXML External Entity
IoCIndicators of Compromise
SFTPSecure File Transfer Protocol
OTOperational Technology
NDANon-disclosure Agreement
NIDSNetwork-based Intrusion Detection System
URLUniform Resource Locator
TCPTransmission Control Protocol
C2Command and Control
SLAService-level Agreement
SOCSecurity Operations Center
BCPBusiness Continuity Plan
OpenVASOpen Vulnerability Assessment Scanner
SDNSoftware-defined Networking
CI/CDContinuous Integration and Continuous Delivery
PHPHypertext Preprocessor
MTTRMean Time to Repair
DMARCDomain-based Message Authentication, Reporting, and Conformance
MTTDMean Time to Detect
ARPAddress Resolution Protocol
ISOInternational Organization for Standardization
BGPBorder Gateway Protocol
SDLCSoftware Development Life Cycle
ITILInformation Technology Infrastructure Library
TFTPTrivial File Transfer Protocol
HTTPSHypertext Transfer Protocol Secure
PIIPersonally Identifiable Information
XMLExtensible Markup Language
CVSSCommon Vulnerability Scoring System
LFILocal File Inclusion
NGFWNext-generation Firewall
SNMPSimple Network Management Protocol
UEBAUser and Entity Behavior Analytics
DoSDenial of Service
HIPSHost-based Intrusion Prevention System
SMTPSimple Mail Transfer Protocol
VLANVirtual LAN
FTPFile Transfer Protocol
MSFMetasploit Framework
CSRFCross-site Request Forgery
IDSIntrusion Detection System
IPInternet Protocol
URIUniform Resource Identifier
NTPNetwork Time Protocol
CVECommon Vulnerabilities and Exposures
USBUniversal Serial Bus
MSPManaged Service Provider
RCERemote Code Execution
SMBServer Message Block
IaaSInfrastructure as a Service
ICMPInternet Control Message Protocol
SOARSecurity Orchestration, Automation, and Response
WANWide Area Network
PCI DSSPayment Card Industry Data Security Standard
LANLocal Area Network
NACNetwork Access Control
DLPData Loss Prevention
PIDProcess Identifier
CISCenter for Internet Security
MSSPManaged Security Service Provider
RFIRemote File Inclusion
EDREndpoint Detection and Response
SSRFServer-side Request Forgery
HIDSHost-based Intrusion Detection System
PAMPrivileged Access Management
SQLStructured Query Languge
MFAMultifactor Authentication
RXSSReflected Cross-site Scripting
RDPRemote Desktop Protocol
SCADASupervisory Control and Data Acquisition
VMVirtual Machine
PLCProgrammable Logic Controller
SWGSecure Web Gateway
CACertificate Authority
AVAntivirus
CERTComputer Emergency Response Team
PKIPublic Key Infrastructure
SIEMSecurity Information and Event Management
IPSIntrusion Prevention System
OWASPOpen Web Application Security Project
ZTNAZero Trust Network Access
SSLSecure Sockets Layer
STIXStructured Threat Information Expression
TRACETrade Reporting and Compliance Engine
TTPTactics, Techniques, and Procedures
COBITControl Objectives for Information and Related Technologies
CSIRTCybersecurity Incident Response Team
IRIncident Response
CASBCloud Access Security Broker
POCProof of Concept
RESTRepresentational State Transfer
TLSTransport Layer Security
BCBusiness Continuity
HTTPHypertext Transfer Protocol
ITInformation Technology